Is De‑Identified Health Information Subject to the HIPAA Privacy Rule?
In short, no. When Protected Health Information (PHI) is transformed to meet HIPAA’s de-identification standards, it is no longer considered PHI and qualifies for a Privacy Rule exemption. The path to that exemption, however, depends on how you de-identify and how you govern residual Risk of Re-Identification.
De-Identification Methods
HIPAA recognizes two primary pathways to de-identify PHI: the Safe Harbor Method and the Expert Determination approach. Both aim to reduce identifiability to an acceptable level, but they differ in how you prove compliance and measure risk.
Two primary pathways
- Safe Harbor Method: remove a specified list of direct and quasi-identifiers and have no actual knowledge that remaining data can identify an individual.
- Expert Determination: a qualified expert applies statistical or scientific principles to conclude the risk of re-identification is very small and documents the analysis.
Common techniques used
- Suppression and generalization (for example, replacing exact dates with years, or precise locations with broader regions).
- Perturbation/noise, masking, and aggregation (binning ages, rounding values, or sampling).
- Pseudonymization with non-derivable codes kept separately for potential re-linkage when authorized.
- Advanced controls such as k-anonymity, l-diversity, t-closeness, or differential privacy to manage residual Risk of Re-Identification.
Your choice should balance data utility with privacy risk, and your documentation should clearly explain how the selected method meets HIPAA’s De-Identification Standards.
Safe Harbor Criteria
Under Safe Harbor, you must remove all 18 identifiers and have no actual knowledge that remaining information could identify an individual. The identifiers are:
- Names.
- Geographic subdivisions smaller than a state (street address, city, county, precinct, ZIP code, and equivalent geocodes), except the initial three digits of a ZIP code if the combined area has more than 20,000 people; otherwise use 000.
- All elements of dates (except year) directly related to an individual (for example, birth, admission, discharge, death) and all ages over 89, which must be aggregated to a single 90-or-older category.
- Telephone numbers.
- Fax numbers.
- Email addresses.
- Social Security numbers.
- Medical record numbers.
- Health plan beneficiary numbers.
- Account numbers.
- Certificate/license numbers.
- Vehicle identifiers and serial numbers, including license plates.
- Device identifiers and serial numbers.
- Web URLs.
- IP address numbers.
- Biometric identifiers (for example, fingerprints, voiceprints).
- Full-face photographs and comparable images.
- Any other unique identifying number, characteristic, or code (except a permitted re-identification code stored separately).
Safe Harbor is deterministic and comparatively straightforward, but it can reduce data utility. Always confirm that your remaining fields cannot be linked with external data to identify a person.
Expert Determination Approach
Expert Determination relies on a qualified expert to assess the context and conclude that the Risk of Re-Identification is very small. The expert must use accepted statistical or scientific methods and must document the techniques, assumptions, and results.
What an expert evaluates
- Distinguishability: how easily records can be singled out in the dataset or by linkage with other data.
- Replicability: whether key attributes are stable enough to enable matching over time.
- Inference risk: the likelihood sensitive attributes can be inferred about an individual.
- Controls: technical and organizational safeguards (for example, access limits, contracts) that further reduce risk.
This pathway preserves more data utility than Safe Harbor but requires rigorous analysis, clear documentation, and periodic review as data environments and external Data Disclosure Regulations evolve.
HIPAA Privacy Rule Scope
Data that meet HIPAA’s de-identification standards are no longer PHI; therefore, they are not subject to the HIPAA Privacy Rule’s use and disclosure restrictions. That is the core Privacy Rule exemption for properly de-identified data.
HIPAA still applies to the process of de-identifying PHI when performed by a covered entity or business associate, and a business associate agreement is required for that work. If you maintain a re-identification code, it cannot be derived from the individual’s information and must be kept separately.
Limited Data Set versus de-identified data
A Limited Data Set (LDS) removes many identifiers but retains certain elements (for example, dates and some geographic data). An LDS remains PHI and can be used or disclosed only for research, public health, or health care operations under a Data Use Agreement.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Data Use and Disclosure
Because de-identified data are not PHI, you may use and disclose them without HIPAA authorizations or minimum necessary analyses. Typical uses include analytics, research, product development, and benchmarking.
Good governance practices
- Prohibit re-identification by contract and restrict attempts to link the data with other sources.
- Control re-identification keys: store separately, limit access, and log any approved re-linkage events.
- Share only what is needed; apply data minimization and aggregation to reduce residual risk.
- Document your de-identification method and decision rationale for auditability.
Clear agreements with recipients help maintain compliance even when HIPAA no longer governs the dataset.
Legal Implications Beyond HIPAA
HIPAA’s exemption does not guarantee freedom from other laws. De-identified health information may still be regulated by federal and state regimes, sectoral rules, and consumer protection standards.
- FTC Act: prohibits unfair or deceptive practices, including misleading claims about “de-identified” status or inadequate security.
- State privacy laws (for example, California CPRA, Colorado CPA, Connecticut, Virginia, Utah): often recognize de-identified data but require reasonable measures to prevent re-identification, public commitments not to re-identify, and contractual controls.
- Specialized laws (for example, FERPA, 42 CFR Part 2, GINA) and state health privacy statutes may apply depending on the data source and context.
- Cross-border transfers may trigger non-U.S. regimes (for example, GDPR) with different de-identification thresholds and tests.
Always assess overlapping obligations before sharing or commercializing de-identified datasets.
Risk Mitigation Strategies
- Select the appropriate pathway (Safe Harbor Method or Expert Determination) based on your use case and required data utility.
- Conduct a structured risk assessment and record linkage testing to estimate the Risk of Re-Identification.
- Apply layered controls: technical (suppression, generalization, noise), organizational (access controls), and contractual (DUAs, anti-reidentification clauses).
- Manage re-identification codes securely; ensure codes are non-derivable and stored separately from de-identified data.
- Adopt ongoing monitoring and periodic re-evaluation as external datasets, threats, and analytics capabilities evolve.
- Limit retention, use privacy-preserving computation when feasible (for example, differential privacy, secure enclaves), and minimize shared attributes.
- Train teams and vendors on De-Identification Standards, data handling, and incident response.
Conclusion
De-identified data that meet HIPAA’s standards are outside the Privacy Rule’s scope, but the journey to that status—and responsible use afterward—requires disciplined methods and governance. By choosing the right pathway, documenting rigorously, and aligning with broader Data Disclosure Regulations, you can unlock data value while honoring privacy.
FAQs
What is de-identified health information?
It is information originally derived from PHI that has been processed to meet HIPAA’s De-Identification Standards so that individuals cannot reasonably be identified. Once de-identified, the data qualify for a HIPAA Privacy Rule exemption.
How does the Safe Harbor method work?
You remove all 18 specified identifiers—such as names, precise locations, contact numbers, and exact dates (except year)—and ensure you have no actual knowledge that remaining fields could identify a person. If those conditions are met, the dataset is de-identified under HIPAA.
Who qualifies as an expert for de-identification?
Under HIPAA, an expert is a person with appropriate knowledge and experience applying statistical or scientific principles to de-identification. They must analyze the data and context, conclude the re-identification risk is very small, and document methods and results.
Is de-identified data completely exempt from all privacy laws?
No. While de-identified data are not PHI under HIPAA, other laws can still apply—such as the FTC Act, state privacy statutes, and sector-specific rules. Many require reasonable safeguards and contractual commitments not to re-identify or attempt linkage.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.